{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-31142","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","state":"PUBLISHED","assignerShortName":"XEN","dateReserved":"2024-03-28T18:14:12.892Z","datePublished":"2024-05-16T13:39:42.774Z","dateUpdated":"2025-11-04T18:30:46.936Z"},"containers":{"cna":{"title":"x86: Incorrect logic for BTC/SRSO mitigations","datePublic":"2024-04-09T16:29:00.000Z","descriptions":[{"lang":"en","value":"Because of a logical error in XSA-407 (Branch Type Confusion), the\nmitigation is not applied properly when it is intended to be used.\nXSA-434 (Speculative Return Stack Overflow) uses the same\ninfrastructure, so is equally impacted.\n\nFor more details, see:\n  https://xenbits.xen.org/xsa/advisory-407.html\n  https://xenbits.xen.org/xsa/advisory-434.html\n"}],"impacts":[{"descriptions":[{"lang":"en","value":"XSAs 407 and 434 are unmitigated, even when the patches are in place.\n"}]}],"affected":[{"defaultStatus":"unknown","product":"Xen","vendor":"Xen","versions":[{"status":"unknown","version":"consult Xen advisory XSA-455"}]}],"configurations":[{"lang":"en","value":"All versions of Xen containing the XSA-407 fixes are vulnerable.\n\nSee XSAs 407 and 434 for details on which hardware is susceptible to\nBTC/SRSO.\n"}],"workarounds":[{"lang":"en","value":"There are no mitigations.\n"}],"credits":[{"lang":"en","type":"finder","value":"This issue was discovered by Andrew Cooper of XenServer.\n"}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-455.html"}],"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2024-05-16T13:39:42.774Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-693","lang":"en","description":"CWE-693 Protection Mechanism Failure"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-20T13:51:28.453648Z","id":"CVE-2024-31142","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-27T21:00:51.019Z"}},{"title":"CVE Program Container","references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-455.html","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/"},{"url":"http://xenbits.xen.org/xsa/advisory-455.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T18:30:46.936Z"}}]}}